A popular tool that helps in identifying vulnerabilities in web applications by scanning their source code is called a what?

  • Firewall
  • Intrusion Detection System (IDS)
  • Static Application Security Testing (SAST) tool
  • Web Application Firewall (WAF)
A popular tool used to identify vulnerabilities in web applications by scanning their source code is called a "Static Application Security Testing (SAST)" tool. SAST tools analyze the source code to identify security issues and vulnerabilities early in the development process.

Which type of attack aims at making a service unavailable by overwhelming it with traffic?

  • Buffer Overflow Attack
  • DDoS (Distributed Denial of Service)
  • Man-in-the-Middle Attack
  • Phishing Attack
A "DDoS" attack stands for Distributed Denial of Service and is designed to make a service unavailable by overwhelming it with traffic, often from multiple sources.

Which type of threat actor is typically motivated by political or ideological beliefs rather than financial gain?

  • Cybercriminal
  • Hacktivist
  • Insider Threat
  • Script Kiddie
Hacktivists are individuals or groups that use hacking skills to promote political or ideological causes. They're motivated by beliefs rather than financial gain. Insider Threats are employees with access to sensitive data, Cybercriminals seek financial gain, and Script Kiddies are amateur hackers.

Sarah, a security analyst, sees an alert from the IDS indicating a potential attack. She reviews the logs and finds no evidence of a breach or unauthorized activity. What kind of alert might this be considered?

  • Evasion Attack Alert
  • False Positive Alert
  • Intrusion Alert
  • True Positive Alert
In this case, it is likely a 'False Positive Alert,' indicating that the IDS incorrectly identified benign network traffic or normal behavior as an attack.

Which protocol is primarily used to secure web traffic between a browser and a server?

  • FTP
  • HTTP
  • HTTPS
  • SMTP
HTTPS (Hypertext Transfer Protocol Secure) is the protocol used for secure web traffic. It provides data encryption, authentication, and secure connections between a browser and a server.

After a recent audit, a company was advised to segregate their network to ensure sensitive data isn't accessible to all employees. Which network security best practice is being recommended?

  • DMZ (Demilitarized Zone)
  • IP Address Spoofing
  • Network Segmentation
  • Port Forwarding
Network Segmentation involves dividing a network into segments to restrict access, reducing the risk of unauthorized access to sensitive data and improving security.

An IDS that actively takes actions, such as blocking traffic or terminating sessions, when a threat is detected is referred to as _______.

  • Firewall
  • Honeypot
  • Intrusion Prevention System
  • Router
An Intrusion Prevention System (IPS) is an IDS that not only detects threats but also takes proactive measures to block or prevent them.

Bob receives an email with a link to a site that looks like his bank's website. When he enters his credentials, they are sent to an attacker instead of the bank. While the real bank's site was not compromised, what kind of attack did Bob fall victim to?

  • Distributed Denial of Service (DDoS)
  • Man-in-the-Middle Attack
  • Phishing Attack
  • SQL Injection
Bob fell victim to a Phishing Attack, where he was deceived into entering his credentials on a fake site. The bank's site itself wasn't compromised.

When employees fail to report security incidents due to fear of reprisal, it's often a sign of a weak _______ culture.

  • Compliance
  • Ethical
  • Organizational
  • Security
When employees fail to report security incidents due to fear of reprisal, it's often a sign of a weak organizational culture. A strong security culture encourages employees to report incidents without fear of negative consequences and emphasizes the importance of security.

After adopting a new BYOD policy, a company notices an increase in security incidents related to mobile devices. What might be an effective measure to decrease these incidents while still allowing BYOD?

  • Ban BYOD entirely
  • Decrease the security awareness training
  • Implement Mobile Device Management (MDM) solutions
  • Increase the number of personal devices allowed
Implementing Mobile Device Management (MDM) solutions can be an effective measure to decrease security incidents related to mobile devices while still allowing BYOD. MDM solutions provide better control and security for company data on personal devices, allowing for features like remote wipe, device encryption, and app management to mitigate risks.